CVE-2019-10062

The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attribute of various other elements. An attacker might also exploit a bug in how the SCRIPT string is processed by splitting and nesting them for example.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bluespire:aurelia_framework:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () https://aurelia.io - Vendor Advisory () https://aurelia.io - Vendor Advisory
References () https://github.com/aurelia/templating-resources/blob/0cef07a8cac8e99146d8e1c4b734491bb3dc4724/src/html-sanitizer.js - Third Party Advisory () https://github.com/aurelia/templating-resources/blob/0cef07a8cac8e99146d8e1c4b734491bb3dc4724/src/html-sanitizer.js - Third Party Advisory
References () https://www.gosecure.net/blog/2021/05/12/aurelia-framework-insecure-default-allows-xss/ - Exploit, Mitigation, Third Party Advisory () https://www.gosecure.net/blog/2021/05/12/aurelia-framework-insecure-default-allows-xss/ - Exploit, Mitigation, Third Party Advisory

Information

Published : 2021-05-13 21:15

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10062

Mitre link : CVE-2019-10062

CVE.ORG link : CVE-2019-10062


JSON object : View

Products Affected

bluespire

  • aurelia_framework
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')